Created by - Mary Smith
Questions 1. A technician has cleaned a virus infection off of a PC using corporate approved software. After a short period of time, the infection returned. Updated virus signatures have also detected the presence of a rootkit. Which of the following would be the BEST course of action to resolve the issue?A) A. Run a System Restore to a time before the first infection was cleaned.B) B. Install a second antivirus suite and run both antivirus products concurrently.C) C. Back up the client-s data and scan it for infections on a known-working PC.D) D. Reformat the hard drive and reload the operation system and applications2. Which of the following Linux commands is used to configure an Ethernet address?A) A. ifconfigB) B. tracerouteC) C. ipconfigD) D. chmod3. Which of the following is a security best practice?A) A. Use multi-factor VPN authentication.B) B. Use only commercially licensed software.C) C. Use only WiFi instead of Ethernet cabling.D) D. Use only solid state hard drives in servers.4. A technician is removing malware from a computer in safe mode and is having trouble with one of the infected files. The anti-malware suite is unable to remove or quarantine it and the system will not let the technician manually delete it, even though it is not in use. Which of the following can the technician use to remove the file?A) A. Open the defrag utility and run a full analysis and defragmentation of the hard drive.B) B. Boot from a pre-installation environment CD and delete the file from the hard drive.C) C. Run attrib followed by the file name with the -h switch from the command prompt.D) D. Install a second full antivirus suite onto the system and run another removal scan.5. An administrator has verified that a PC has no Internet connectivity. Using ipconfig shows that the IP address for the machine is completely different than the assigned network address. After using ipconfig /release and ipconfig /renew, the computer is still assigned the same address. Which of the following is MOST likely the cause of the issue?A) A. The NIC drivers are not properly installedB) B. HomeGroup is misconfiguredC) C. DHCP server is unavailableD) D. A static IP address is configured Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following shell redirections will write standard output and standard error output to a file named filename?A) A. 2>&1 >filenameB) B. >filename 2>&1C) C. 1>&2>filenameD) D. >>filenameE) E. 1&2>filename2. In the vi editor, which of the following commands will copy the current line into the vi buffer?A) A. cB) B. ccC) C. 1cD) D. yyE) E. 1y3. Which of the following sequences in the vi editor saves the opened document and exits the editor? (Choose TWO correct answers.)(Select 2answers)A) A. esc ZZB) B. ctrl :w!C) C. esc zzD) D. esc :wq!E) E. ctrl XX4. When starting a program with the nice command without any additional parameters, which nice level is set for the resulting process?A) A. -10B) B. 0C) C. 10D) D. 205. Which of the following commands will reduce all consecutive spaces down to a single space?A) A. tr 's' ' ' < a.txt > b.txtB) B. tr -c ' ' < a.txt > b.txtC) C. tr -d ' ' < a.txt > b.txtD) D. tr -r ' ' ' ' < a.txt > b.txtE) E. tr -s ' ' < a.txt > b.txt Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: DExplanation: 3. Right Answer: A,DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Company policy requires the use if passphrases instead if passwords. Which of the following technical controls MUST be in place in order to promote the use of passphrases?A) HistoryB) LengthC) ReuseD) Complexity2. Management wishes to add another authentication factor in addition to fingerprints and passwords in order to have three-factor authentication. Which of the following would BEST satisfy this request?A) Token fobB) PassphraseC) Retinal scanD) Security question3. Company A has acquired Company B. Company A has different domains spread globally,and typically migrates its acquisitions infrastructure under its own domain infrastructure. Company B,however,cannot be merged into Company A's domain infrastructure. Which of the following methods would allow the two companies to access one another's resources?A) AttestationB) Single sign-onC) FederationD) Kerberos4. A stock trading company had the budget for enhancing its secondary datacenter approved. Since the main site is a hurricane-affected area and the disaster recovery site is 100 mi (161 km) away,the company wants to ensure its business is always operational with the least amount of man hours needed. Which of the following types of disaster recovery sites should the company implement?A) Cloud-based siteB) Cold siteC) Warm siteD) Hot site5. Joe,a technician,is working remotely with his company provided laptop at the coffee shop near his home. Joe is concerned that another patron of the coffee shop may be trying to access his laptop. Which of the following is an appropriate control to use to prevent the other patron from accessing Joe's laptop directly?A) Host-based firewallB) full-disk encryptionC) Current antivirus definitionsD) Latest OS updates Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician is trying to perform a new installation of an operating system on a computer without an optical drive. Which of the following boot sources can be used?A) A. Windows easy transferB) B. Copy of SYSTEM folderC) C. USMTD) D. Flash drive2. A network administrator has moved several users- folders to a different server. After mapping to the new shared drive, the users can access each other-s- files.Which of the following could be the cause of this issue?A) A. Administrator permissionsB) B. File permissionsC) C. File fragmentationD) D. Network segmentation3. A technician needs to repurpose a hard drive that has confidential information on it. Which of the following methods is MOST appropriate?A) A. IncinerationB) B. OverwriteC) C. DegaussD) D. Quick format4. A computer on a Windows domain has been identified as not having the most current policy. Which of the following tools would a technician run on the local machine to rectify this?A) A. gpresultB) B. msconfigC) C. ipconfigD) D. gpupdate5. After confirming BIOS support, technician has added a second video card and a new sound card to a computer-s motherboard. The computer continuously restarts.This is an indication of which of the following.A) A. Incompatible sound cardB) B. Insufficient power supplyC) C. Insufficient memoryD) D. Defective video card Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: DExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which character, added to the end of a command, runs that command in the background as a child process of the current shell?A) A. !B) B. +C) C. &D) D. %E) E. #2. Which of the following commands will print the last 10 lines of a text file to the standard output?A) A. cat -n 10 filenameB) B. dump -n 10 filenameC) C. head -n 10 filenameD) D. tail -n 10 filename3. Which of the following commands prints a list of usernames (first column) and their primary group (fourth column) from the /etc/passwd file?A) A. fmt -f 1,4 /etc/passwdB) B. split -c 1,4 /etc/passwdC) C. cut -d : -f 1,4 /etc/passwdD) D. paste -f 1,4 /etc/passwd4. Which of the following signals is sent to a process when the key combination CTRL+C is pressed on the keyboard?A) A. SIGTERMB) B. SIGINTC) C. SIGSTOPD) D. SIGKILL5. What happens after issuing the command vi without any additional parameters?A) A. vi starts and loads the last file used and moves the cursor to the position where vi was when it last exited.B) B. vi starts and requires the user to explicitly either create a new or load an existing file.C) C. vi exits with an error message as it cannot be invoked without a file name to operate on.D) D. vi starts in command mode and opens a new empty file.E) E. vi starts and opens a new file which is filled with the content of the vi buffer if the buffer contains text. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A user is unable to open a file that has a grayed-out icon with a lock. The user receives a pop-up message indicating that payment must be sent in Bitcoin to unlock the file. Later in the day,other users in the organization lose the ability to open files on the server. Which of the following has MOST likely occurred? (Choose three.)(Select 3answers)A) RansomwareB) Crypto-malwareC) Botnet attackD) VirusE) BackdoorF) Adware2. Joe,a salesman,was assigned to a new project that requires him to travel to a client site. While waiting for a flight,Joe,decides to connect to the airport wireless network without connecting to a VPN,and the sends confidential emails to fellow colleagues. A few days later,the company experiences a data breach. Upon investigation,the company learns Joe's emails were intercepted. Which of the following MOST likely caused the data breach?A) Policy violationB) Social engineeringC) Insider threatD) Zero-day attack3. Company A agrees to provide perimeter protection,power,and environmental support with measurable goals for Company B,but will not be responsible for user authentication or patching of operating systems within the perimeter. Which of the following is being described?A) Interoperability agreementB) Service level agreementC) Business partner agreementD) Memorandum of understanding4. A technician is investigating a potentially compromised device with the following symptoms: Browser slowness Frequent browser crashes Hourglass stuck New search toolbar Increased memory consumption Which of the following types of malware has infected the system?A) SpywareB) SpooferC) Man-in-the-browserD) Adware5. Multiple organizations operating in the same vertical want to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?A) SAMLB) ShibbolethC) OAuthD) OpenID connectE) RADIUS federation Right Answer and Explanation: 1. Right Answer: A,B,DExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Several users of a shared computer report that Windows often indicates an improper shutdown was experienced upon power on. Which of the following would be the BEST course of action to determine which user is responsible for causing the issue?A) A. Review the System LogB) B. Check msconfig utilityC) C. Checkboot. iniD) D. Review the ntuser.dat file2. An administrator must upgrade multiple workstations with a new image being deployed using Windows Deployment Services. Which of the following client-side boot methods initiates the deployment of the new image?A) A. USB flash driveB) B. CD-ROMC) C. PXED) D. GRUB3. A user calls the help-desk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices?A) A. Identify symptoms, quarantine infected system, and create restore point.B) B. Quarantine infected system, identify symptoms, and create restore point.C) C. Identify symptoms, educate end user, and create restore point.D) D. Create restore point, identify symptoms, and quarantine infected system.4. A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the email to only be stored on this tablet. Which of the following email server setting types would the technician use to accomplish this task?A) A. POP3B) B. IMAPC) C. S/MIMED) D. SMTP5. A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent?A) A. Measured serviceB) B. Rapid elasticityC) C. On-demandD) D. Resource pooling Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following command sets the Bash variable named TEST with the content FOO?A) A. set TEST='FOO'B) B. TEST = 'FOO'C) C. var TEST='FOO'D) D. TEST='FOO'2. Which variable defines the directories in which a Bash shell searches for executable commands?A) A. BASHEXECB) B. BASHRCC) C. PATHD) D. EXECPATHE) E. PATHRC3. Which of the following commands determines the type of a file by using a definition database file which contains information about all common file types?A) A. magicB) B. typeC) C. fileD) D. pmagicE) E. hash4. Which of the following commands prints all files and directories within the /tmp directory or its subdirectories which are also owned by the user root? (ChooseTWO correct answers.)(Select 2answers)A) A. find /tmp -uid root -printB) B. find -path /tmp -uid rootC) C. find /tmp -user root -printD) D. find /tmp -user rootE) E. find -path /tmp -user root 'print5. When running the command -sed -e 's/a/b/' /tmp/file >/tmp/filewhile /tmp/file contains data, why is /tmp/file empty afterwards?A) A. The file order is incorrect. The destination file must be mentioned before the command to ensure redirection.B) B. The command sed did not match anything in that file therefore the output is empty.C) C. When the shell establishes the redirection it overwrites the target file before the redirected command starts and opens it for reading.D) D. Redirection for shell commands do not work using the > character. It only works using the | character instead. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: C,DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A vulnerability scan is being conducted against a desktop system. The scan is looking for files,versions,and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?A) Non-intrusiveB) ActiveC) CredentialedD) Authenticated2. Management wants to ensure any sensitive data on company-provided cell phones is isolated in a single location that can be remotely wiped if the phone is lost. Which of the following technologies BEST meets this need?A) GeofencingB) SandboxingC) ContainerizationD) Device encryption3. A user downloads and installs an MP3 converter,and runs the application. Upon running the application,the antivirus detects a new port in a listening state. Which of the following has the user MOST likely executed?A) WormB) RATC) RansomwareD) Bot4. During a recent audit,several undocumented and unpatched devices were discovered on the internal network. Which of the following can be done to prevent similar occurrences?A) Configure the WAPs to use NAC and refuse connections that do not pass the health checkB) Implement rogue system detection and configure automated alerts for new devicesC) Install DLP controls and prevent the use of USB drives on devicesD) Run weekly vulnerability scans and remediate any missing patches on all company devices5. During a recent audit,it was discovered that many services and desktops were missing security patches. Which of the following BEST describes the assessment that was performed to discover this issue?A) Port ScanB) Network mappingC) Vulnerability scanD) Protocol analysis Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review